Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage

Size: px
Start display at page:

Download "Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage"

Transcription

1 241 Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage Patrick Bedué bedue@stud.uni-frankfurt.de Wenxia Han s @stud.uni-frankfurt.de Mathias Hauschild s @stud.uni-frankfurt.de Maximilian Pötz s @stud.uni-frankfurt.de Mirjam Minor minor@cs.uni-frankfurt.de Abstract: With increasing growth of cloud services and the ability to choose from different cloud providers, we propose a new way to connect cooking workflows with a high security cloud storage. We use Activiti for workflow design and JavaScript Object Notation (JSON) for structured data interchange with a sealed cloud storage. This approach supports cooking workflows with instructions from multimedia data (e.g. videos, pictures) for special interest groups of the cooking domain like private communities or even chronically ill patients. The paper makes a contribution to current trends in information-systems related research such as scalability and experience reuse. Further, it connects Cloud Computing with Business Process Management. 1 Introduction With growing globalization, information technology has become a key resource for business success or failure. IT is often used to manage business processes in companies and has become increasingly important, leading to a rise in new ways to organize business processes (Aalst, Benatallah et al. 2003). Cloud Computing changes the way we can develop and organize our resources and also enables a flexible and individual allocation of resources (Ciovică, Cristescu et al. 2014, Schulte, Janiesch et al. 2015). Business processes are modelled as a collection of activities, dependencies between activities and are technically supported by workflows (Aalst, Benatallah et al. 2003). Regarding actual research topics, realizing business processes in a flexible and costefficient way is on a rise (Schulte, Janiesch et al. 2015). There are some studies focusing on workflow execution in the cloud investigating infrastructural challenges of elastic Business Process Management or security issues (Wang, Korambath et al. 2014, Schulte, Janiesch et al. 2015). To develop our research proposition, we concentrate our work on the implementation of workflows in the cooking domain with a special focus on applying secure cloud technology for multimedia data integration and data objects representing ingredients. To improve the user experience, we investigate the feasibility of using multimedia data from a high security cloud storage and of integrating this data into workflows. The user advantage is that she no longer needs to store big multimedia files on her device and can execute workflows in a web interface. Secure cloud technology provides rapid Copyright 2015 for this paper by its authors. Copying permitted for private and academic purposes. In Proceedings of the ICCBR 2015 Workshops. Frankfurt, Germany.

2 242 scalability as well as data protection. Both are beneficial properties for using multimedia data in the cooking domain. With our proposed solution, the user is able to easily create cooking recipes on a platform and store multimedia data. Having started the workflow, the user is provided with cooking instructions including pictures or videos. Using secure cloud technology addresses private communities which e.g. do not want to publish content or appear in any videos accessible to the public, for instance chronically ill persons or allergy sufferers who do not want to share their special recipes or videos because their identity might be linked to serious diseases. For many people it is not an option to simply store the content on scalable platforms like YouTube because their children might be visible or because their employer might get knowledge about their special concerns. Our solution combines scalability with additional security and ensures that content is protected from persons who are not supposed to have access to the recipes. The technical solution is based on IDGARD which allows to separate data in different, sealed containers and to keep own videos or pictures confidential. With this new solution we address the open challenge of the Computer Cooking Contest. The remainder of our paper is structured as follows. At first we will provide an overview of our architecture and a sample of a workflow to ease comprehensibility. After that we will present our implementation concept and workflows from the cooking domain, which are based on cooking recipes of pasta. We conclude with a discussion of our research contribution and the new prospects for both companies and researchers. 2 Fundamentals Sealed Cloud A broad range of providers offer different models for services at different layers. But most of them do not guarantee security for the clients of a cloud provider or the privacy of the data (Santos, Gummadi et al. 2009). Especially in Germany, data protection and compliance issues require new technologies such as sealed cloud technology (Rieken 2015). A sealed cloud offers the technology to encrypt contents and meta data so that the cloud provider itself is not able to access data contents. The monitoring of user behavior and the possible access to protected content by providers is a big issue as part of data privacy and anonymity in the internet. We implement a new architecture to integrate multimedia data from the cloud using Activiti as a workflow engine and the sealed cloud IDGARD. Copyrighted Content From a user perspective, the access to files via the internet, for instance, by using mobile devices can be risky, because some information can be spied out by unauthorized persons. If some potential attackers retrieve user information while data is sent over the wire they may gain full access to the data storage. To prevent these attacks the usage of security tokens or passcodes (received via SMS) is necessary. IDGARD provides some of these additional security mechanisms.

3 243 From the provider perspective it is also difficult to secure data and protect it from unauthorized access or illegal sharing. Providers want to ensure that only one user or a specific user group is able to access data with the registered devices. By sending the unique keys to the registered devices, content providers can prevent the unauthorized sharing of data (e.g. by using a sealed cloud). There are similar examples in the nutrition domain where images or videos are already protected, for instance mycoachnutrition.com (MyCoachNutrition 2015). Like our approach, these services offer user individual content. In contrast to our work, they do not provide rapid scalability. Definition of Workflows Work is often organized as a sequence of individual tasks in which the progress can be observed (Hammer and Champy 1994). These individual tasks are linked to each other and they underlie a business objective or a policy goal (Workflow Management Coalition 1998). The automation of business processes is called workflow. According to the definition of the Workflow Management Coalition, a workflow is: The automation of a business process, in whole or part, during which documents, information or tasks are passed from one participant to another for action, according to a set of procedural rules. (Workflow Management Coalition 1998). In the remainder of this paper, we will use the term workflow as synonym for business process. For our project, we model different cooking instructions using Activiti as a workflow engine. A simple workflow consists of a start event, a task with a data object and an end event (see Figure 1). A task or an activity describes a piece of work that forms a logical step in a process. To support the process execution the workflow activity requires human and/or machine resources for process execution (Workflow Management Coalition 1998). We use different tasks and data objects to describe a cooking control flow. Rice Task (cook) Figure 1: Sample workflow (own representation)

4 244 3 Architecture General overview As illustrated in Figure 2, the introduced architecture consists of three layers: From the perspective of the user, the first layer or sub-component is based on the so called Ninja Web-Framework, which is required in order to handle the graphical interaction with the user by initiating a workflow instance. Below the Web Framework, the Business Process Management (BPM) platform Activiti initially receives the user commands and controls the processing of the corresponding instance. The Activity engine requests relevant information from the data source (IDGARD) and hands them over to the user. IDGARD, as the third or bottom layer of the architecture, is not just an external database but a sealed cloud solution. Therefore, it does not only store the data but provides API functions that ensure secure retrieval. Worklist/ User Interaction Submission Handling (Flow Control) Resource Access (Data Interaction) Figure 2: Architecture (own representation) Reasons for Usage of a 3-Layer-Architecure and its Components Since the goal is to develop and execute (cooking) workflows it is required to use Business Process Management and a solution to save the corresponding multimedia data. As a result, it is pre-determined to stage a 2-Layer-Architecure at minimum. Since it is a typical demand that users have not just local access to the workflows, a browserbased solution is reasonable. This kind of functionality is not offered by the already mentioned layers and therefore asks for an additional one.

5 245 Starting from the bottom layer, there is the complex question of how to save an application s data or where to put it. As Cloud Computing nowadays has already overcome just being a trend, it is appropriate and scientifically valuable to embed this idea into various contexts. IDGARD s sealed cloud is specifically designed to enhance security. Because protecting own content like graphically supported cooking steps or even whole recipes can be important, such a cloud service might be beneficial. This especially applies to companies that want to distribute such services via Internet and protect themselves against copyright infringements. Concerning the choice of a workflow engine, there is a huge range of open source technologies available. In terms of basic functionality (e.g. integration in an IDE or graphically establishing workflows) they usually show similarities. To address our requirements properly we decided to use two different GUI s for our project. Activiti as the modelling GUI and the Ninja Web-Framework for the user worklist. However, Activiti convinces with a distinct manual, a large community and a clear, browser based testing environment. To provide the worklist, the Ninja Web-Framework is useful because, as an integrated software stack, it already comprises many important libraries. By using a MongoDB database, we save standardized keywords for each possible instruction and ingredient on the one hand, as well as the recipes with already assigned processing times, instructions and information on the other hand. We are planning to use time information for the retrieval of a process in our future work. 4 Implementation Concept An abstract class in Java defines the fundamental set of functions, i.e. basic java members and abstract methods that deal with communicating information between java and JSON, and the log file for further checks and troubleshooting. Each function has still its own unique representation for requests and responses including the corresponding JSON formats. In order to successfully connect request- and response functionality for data interchange, some middleware classes are required. For providing cloud access, we have to send login-data and a random token of the client for identification purposes. The factory pattern is used to invoke requests and their corresponding response classes. The Java classes that realize the communication with the cloud server are directly implemented in the workflows, which we use for cooking instructions. Workflow engines for Business Process Management are abounding. Examples for these are JBoss, jbpm or Activiti. For our workflow development, we use Activiti as an open source workflow engine. Activiti uses BPMN 2.0 as a modelling language and can be easily integrated with Java environments (Alfresco 2015). We used seven already created pasta cooking workflows from the work of Minor et al. and converted them into an Activiti workflow (see Figure 3 following Minor, Bergmann et al. 2010). Each cooking task is modelled by a service task. This kind of task enables us to invoke

6 246 a Java class for API cloud access. We also deposit the ingredients as data objects directly in the activity workflow. Other content like pictures or movies for cooking instructions are stored in the cloud. In the example we have four individual instructions for the user. First, cook and place in serving bowl as well as puree should be conducted in parallel. Parallelization can be modelled using XOR-, AND- (symbolized by the plus), or LOOP-blocks (Schumacher, Minor et al. 2013). When both branches are finished the last task is toss. In each task, users get instructions with support of multimedia data from the cloud. To execute our designed workflows we use the Ninja Web framework. The Web framework (worklist) is a resource which performs the work presented by a workflow activity instance and Figure 4: Current worklist (own representation) therefore directly interacts with the user and supports her in executing her tasks (Workflow Management Coalition 1998). After successfully logging in, a user can choose to design her own recipe and upload new elements or choose ingredients to process. When searching for new processes for recipes in the database it is difficult to find a workflow or recipe which is well suited for the desired ingredients. To implement a search, case-based retrieval can be used. However, because of the small size of the recipe base in our solution this is not implemented yet. Each recipe consists of several steps that are described by its linked ingredients, related instructions and actions that are supposed to be undertaken. In Figure 4, the prototypical implementation of our worklist is depicted. The sample picture is directly imported from the cloud. The non-multimedia information around the task is saved in a MongoDB database. When the user starts to cook she immediately sees which ingredients she needs, processing time, next steps and a video or picture to support her task. In the left top corner of Figure 4, one can see the ingredients to be used for the particular task. In the center is a management board with the instructions supported by a video or

7 247 a picture of the specific task. The workflow running in the background is modelled in BPMN 2.0. By pressing next step the user is guided to the next task of the related recipe as specified in the BPMN workflow. Thereby, we provide a worklist with different instructions for a kitchen chef. 5 Discussion and Conclusion In our paper we present a novel approach to integrate a high security cloud storage (sealed cloud) in Business Process Management. We implement a new model for using a sealed cloud multimedia data storage for our workflow contents. The implementation of a case-based retrieval is not implemented yet. As a first step, we demonstrate a pastacooking workflow, which can be processed or uploaded by the user in a web form. The content is stored in the sealed cloud IDGARD of the Uniscon GmbH who provides the cloud infrastructure. The content and meta data is encrypted and protected from unauthorized provider or third-party access. By using cloud storage for our workflows we examine two main benefits: data protection and scalability. With the IDGARD solution third parties are not able to copy or even access the data. Scalable storage provides the advantage of adapting storage up and down on-demand without using rare data space on physical disks of computers or other devices (Armbrust, Fox et al. 2009). By using IDGARD, we are able to scale our storage capacity in a flexible way in response to service usage and new customer demands. Since it is very difficult to estimate, what recipes and data with instructions will be added, scalability is very important. Apart from that, the evolution in terms of video quality has significantly risen in the past years (and probably keeps rising in the future) which contributes to the fact that scalability is an important factor because customers also tend to pressure companies to provide state-of-the-art content. The amount of data that goes along with this development is significant. It is also possible to migrate our workflow engine into a cloud solution in future. As a result, the whole platform can be scaled in response to service usage. To sum up, our approach of using cloud storage for workflows in the cooking domain benefits from flexible scalability, higher privacy and data protection leading to a higher user experience especially for special interest groups of the cooking domain. The user no longer needs to use her limited, physical storage. She can store multimedia data with cooking instructions directly in the cloud. Our work also contributes to other future trends besides the cooking domain. Sealed cloud technology offers opportunities to use cloud storage without harming privacy or security regulations. This can be very important for audit companies who want to store audit-documents or other critical contents in the cloud.

8 248 7 Acknowledgment We would like to acknowledge our partnership with the Uniscon GmbH who provided us with their sealed cloud service IDGARD. 8 References Aalst, W. M., B. Benatallah and F. Casati (2003). Business Process Management, Springer-Verlag Berlin Heidelberg. Alfresco. (2015). "Activiti mission statement." Retrieved , 2015, from Armbrust, M., A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica and M. Zaharia (2009). Above the Clouds: A Berkeley View of Cloud Computing, Technical Report, UC Berkeley Reliable Adaptive Distributed Systems Laboratory. Ciovică, L., M. P. Cristescu and L. A. Fraţilă (2014). "Cloud Based Business Processes Orchestration." Procedia Economics and Finance 16(0): Workflow Management Coalition (1998) "Terminology & Glossary." Retrieved , 2015, from Hammer, M. and J. Champy (1994). Business Reengineering: Die Radikalkur für das Unternehmen. Campus-Verlag Frankfurt. Minor, M., R. Bergmann, S. Görg and K. Walter (2010). Adaptation of cooking instructions following the workflow paradigm, In: ICCBR 2010 Workshop Proceedings, pp MyCoachNutrition. (2015). "MyCoachNutrition." Retrieved , 2015, from Rieken, R. (2015). Datensicherheit als Herausforderung im Cloud-Computing-Trend. In: Marktplätze im Umbruch: pp , Springer. Santos, N., K. P. Gummadi and R. Rodrigues (2009). Towards trusted cloud computing. In: Proceedings of the 2009 conference on Hot topics in cloud computing. San Diego, California, USENIX Association. Schulte, S., C. Janiesch, S. Venugopal, I. Weber and P. Hoenisch (2015). "Elastic Business Process Management: State of the art and open challenges for BPM in the cloud." Future Generation Computer Systems 46(0): Schumacher, P., M. Minor and E. Schulte-Zurhausen (2013). Extracting and enriching workflows from text. In: Proceedings of the 2013 IEEE 14 th International Conference on Information Reuse and Integration (IRI), pp Wang, J., P. Korambath, I. Altintas, J. Davis and D. Crawl (2014). "Workflow as a Service in the Cloud: Architecture and Scheduling Algorithms." Procedia Computer Science 29(0):

Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage

Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage Enriching Cooking Workflows with Multimedia Data from a High Security Cloud Storage Patrick Bedué bedue@stud.uni-frankfurt.de Wenxia Han s0611400@stud.uni-frankfurt.de Mathias Hauschild s8722400@stud.uni-frankfurt.de

More information

A Proposed Case for the Cloud Software Engineering in Security

A Proposed Case for the Cloud Software Engineering in Security A Proposed Case for the Cloud Software Engineering in Security Victor Chang and Muthu Ramachandran School of Computing, Creative Technologies and Engineering, Leeds Metropolitan University, Headinley,

More information

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT

THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT TREX WORKSHOP 2013 THE CLOUD AND ITS EFFECTS ON WEB DEVELOPMENT Jukka Tupamäki, Relevantum Oy Software Specialist, MSc in Software Engineering (TUT) tupamaki@gmail.com / @tukkajukka 30.10.2013 1 e arrival

More information

Data Integrity for Secure Dynamic Cloud Storage System Using TPA

Data Integrity for Secure Dynamic Cloud Storage System Using TPA International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

How To Understand Cloud Computing

How To Understand Cloud Computing International Journal of Advanced Computer and Mathematical Sciences ISSN 2230-9624. Vol4, Issue3, 2013, pp234-238 http://bipublication.com CURRENT SCENARIO IN ARCHITECT AND APPLICATIONS OF CLOUD Doddini

More information

Geoprocessing in Hybrid Clouds

Geoprocessing in Hybrid Clouds Geoprocessing in Hybrid Clouds Theodor Foerster, Bastian Baranski, Bastian Schäffer & Kristof Lange Institute for Geoinformatics, University of Münster, Germany {theodor.foerster; bastian.baranski;schaeffer;

More information

SECURITY THREATS TO CLOUD COMPUTING

SECURITY THREATS TO CLOUD COMPUTING IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 101-106 Impact Journals SECURITY THREATS TO CLOUD

More information

Data Integrity Check using Hash Functions in Cloud environment

Data Integrity Check using Hash Functions in Cloud environment Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology

More information

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD

AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF THE DATA INTEGRATION BASED CLOUD Koncha Anantha Laxmi Prasad 1, M.Yaseen Pasha 2, V.Hari Prasad 3 1

More information

The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary

The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary The Workflow Management Coalition Specification Workflow Management Coalition Terminology & Glossary Workflow The automation of a business process, in whole or part, during which documents, information

More information

A Review of Load Balancing Algorithms for Cloud Computing

A Review of Load Balancing Algorithms for Cloud Computing www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8297-8302 A Review of Load Balancing Algorithms for Cloud Computing Dr.G.N.K.Sureshbabu

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK IMPLEMENTATION OF AN APPROACH TO ENHANCE QOS AND QOE BY MIGRATING SERVICES IN CLOUD

More information

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS

PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,

More information

Winery A Modeling Tool for TOSCA-based Cloud Applications

Winery A Modeling Tool for TOSCA-based Cloud Applications Institute of Architecture of Application Systems Winery A Modeling Tool for TOSCA-based Cloud Applications Oliver Kopp 1,2, Tobias Binz 2, Uwe Breitenbücher 2, and Frank Leymann 2 1 IPVS, 2 IAAS, University

More information

Secured Storage of Outsourced Data in Cloud Computing

Secured Storage of Outsourced Data in Cloud Computing Secured Storage of Outsourced Data in Cloud Computing Chiranjeevi Kasukurthy 1, Ch. Ramesh Kumar 2 1 M.Tech(CSE), Nalanda Institute of Engineering & Technology,Siddharth Nagar, Sattenapalli, Guntur Affiliated

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Copyright IEEE. Citation for the published paper:

Copyright IEEE. Citation for the published paper: Copyright IEEE. Citation for the published paper: This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of BTH's products

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 8, August-2014 68 A Survey of Load Balancing Algorithms using VM B.KalaiSelvi 1 and Dr.L.Mary Immaculate Sheela 2 1 Research

More information

CMotion: A Framework for Migration of Applications into and between Clouds

CMotion: A Framework for Migration of Applications into and between Clouds Institute of Architecture of Application Systems CMotion: A Framework for Migration of Applications into and between Clouds Tobias Binz, Frank Leymann, David Schumm Institute of Architecture of Application

More information

Security Challenges in Hybrid Cloud Infrastructures

Security Challenges in Hybrid Cloud Infrastructures Security Challenges in Hybrid Cloud Infrastructures Koushik Annapureddy Aalto University - School of Science and Technology koushik.annapureddy@tkk.fi Abstract Cloud computing has the potential to significantly

More information

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE Ankur Saraf * Computer Science Engineering, MIST College, Indore, MP, India ankursaraf007@gmail.com

More information

Web 2.0-based SaaS for Community Resource Sharing

Web 2.0-based SaaS for Community Resource Sharing Web 2.0-based SaaS for Community Resource Sharing Corresponding Author Department of Computer Science and Information Engineering, National Formosa University, hsuic@nfu.edu.tw doi : 10.4156/jdcta.vol5.issue5.14

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD

IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD IMPLEMENTATION CONCEPT FOR ADVANCED CLIENT REPUDIATION DIVERGE AUDITOR IN PUBLIC CLOUD 1 Ms.Nita R. Mhaske, 2 Prof. S.M.Rokade 1 student, Master of Engineering, Dept. of Computer Engineering Sir Visvesvaraya

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

Model-Driven Engineering meets the Platform-as-a-Service Model

Model-Driven Engineering meets the Platform-as-a-Service Model Model-Driven Engineering meets the Platform-as-a-Service Model Adrián Juan-Verdejo Information Systems Chair Stuttgart University, Germany adrianppg@gmail.com Abstract. Organisations who want to migrate

More information

Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm

Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 7(July 2012), PP 141-147 Advanced Task Scheduling for Cloud Service Provider Using Genetic Algorithm 1 Sourav Banerjee, 2 Mainak Adhikari,

More information

Optimized and Secured Educlouds by Implementing Virtualization

Optimized and Secured Educlouds by Implementing Virtualization International Journal of Electronics and Computer Science Engineering 2404 Available Online at www.ijecse.org ISSN- 2277-1956 Optimized and Secured Educlouds by Implementing Virtualization R. Rajesh 1,

More information

A Web Base Information System Using Cloud Computing

A Web Base Information System Using Cloud Computing A Web Base Information System Using Cloud Computing Zainab Murtadha, Mohammad Amin Roshanasan Abstract: Cloud Computing is the new field that was invented and developed during a period not so long ago.

More information

Privacy-Aware Scheduling for Inter-Organizational Processes

Privacy-Aware Scheduling for Inter-Organizational Processes Privacy-Aware Scheduling for Inter-Organizational Processes Christoph Hochreiner Distributed Systems Group, Vienna University of Technology, Austria c.hochreiner@infosys.tuwien.ac.at Abstract Due to the

More information

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment

An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment An Efficient Checkpointing Scheme Using Price History of Spot Instances in Cloud Computing Environment Daeyong Jung 1, SungHo Chin 1, KwangSik Chung 2, HeonChang Yu 1, JoonMin Gil 3 * 1 Dept. of Computer

More information

Context Aware Mobile Network Marketing Services

Context Aware Mobile Network Marketing Services Context-aware Mobile Multimedia Services in the Cloud Dejan Kovachev, Ralf Klamma Chair for Computer Science 5 (Information Systems), RWTH Aachen University Ahornstr. 55, D-52056, Aachen, Germany {kovachev,

More information

PLATFORM-AS-A-SERVICE (PAAS): THE ADOXX METAMODELLING PLATFORM

PLATFORM-AS-A-SERVICE (PAAS): THE ADOXX METAMODELLING PLATFORM PLATFORM-AS-A-SERVICE (PAAS): THE ADOXX METAMODELLING PLATFORM Dimitris Karagiannis and Niksa Visic University of Vienna, Knowledge Engineering Research Group, Brünnerstr. 72, A-1210 Vienna, Austria {dk,

More information

CLOUD BASED HOME SECURITY 1 Anjali Chachra 1

CLOUD BASED HOME SECURITY 1 Anjali Chachra 1 CLOUD BASED HOME SECURITY 1 Anjali Chachra 1 Computer Science, KJ Somaiya college of engineering Email: 1 chachraanjali@yahoo.co.in Abstract This report deals with the design and implementation of a Home

More information

An Architecture Model of Sensor Information System Based on Cloud Computing

An Architecture Model of Sensor Information System Based on Cloud Computing An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National

More information

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT

MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India

More information

Understanding the Cloud: Towards a Suitable Cloud Service

Understanding the Cloud: Towards a Suitable Cloud Service International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 1 Understanding the Cloud: Towards a Suitable Cloud Service Huda S. Alrowaihi Computer Information Systems,

More information

An Overview on Important Aspects of Cloud Computing

An Overview on Important Aspects of Cloud Computing An Overview on Important Aspects of Cloud Computing 1 Masthan Patnaik, 2 Ruksana Begum 1 Asst. Professor, 2 Final M Tech Student 1,2 Dept of Computer Science and Engineering 1,2 Laxminarayan Institute

More information

San Diego Supercomputer Center, UCSD. Institute for Digital Research and Education, UCLA

San Diego Supercomputer Center, UCSD. Institute for Digital Research and Education, UCLA Facilitate Parallel Computation Using Kepler Workflow System on Virtual Resources Jianwu Wang 1, Prakashan Korambath 2, Ilkay Altintas 1 1 San Diego Supercomputer Center, UCSD 2 Institute for Digital Research

More information

Dynamic Resource Pricing on Federated Clouds

Dynamic Resource Pricing on Federated Clouds Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:

More information

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,

Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving, Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

Early Cloud Experiences with the Kepler Scientific Workflow System

Early Cloud Experiences with the Kepler Scientific Workflow System Available online at www.sciencedirect.com Procedia Computer Science 9 (2012 ) 1630 1634 International Conference on Computational Science, ICCS 2012 Early Cloud Experiences with the Kepler Scientific Workflow

More information

Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications

Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications Enhancing Dataset Processing in Hadoop YARN Performance for Big Data Applications Ahmed Abdulhakim Al-Absi, Dae-Ki Kang and Myong-Jong Kim Abstract In Hadoop MapReduce distributed file system, as the input

More information

DC2AP Metadata Editor: A Metadata Editor for an Analysis Pattern Reuse Infrastructure

DC2AP Metadata Editor: A Metadata Editor for an Analysis Pattern Reuse Infrastructure DC2AP Metadata Editor: A Metadata Editor for an Analysis Pattern Reuse Infrastructure Douglas Alves Peixoto, Lucas Francisco da Matta Vegi, Jugurta Lisboa-Filho Departamento de Informática, Universidade

More information

Semantic Business Process Management Lectuer 1 - Introduction

Semantic Business Process Management Lectuer 1 - Introduction Arbeitsgruppe Semantic Business Process Management Lectuer 1 - Introduction Prof. Dr. Adrian Paschke Corporate Semantic Web (AG-CSW) Institute for Computer Science, Freie Universitaet Berlin paschke@inf.fu-berlin.de

More information

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT

AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN APPROACH TOWARDS FUNCTIONING OF PUBLIC AUDITABILITY FOR CLOUD ENRICHMENT Mohd Abdul Shoaib 1, Akheel Mohammed 2, Ayesha 3

More information

Cloud application for water resources modeling. Faculty of Computer Science, University Goce Delcev Shtip, Republic of Macedonia

Cloud application for water resources modeling. Faculty of Computer Science, University Goce Delcev Shtip, Republic of Macedonia Cloud application for water resources modeling Assist. Prof. Dr. Blagoj Delipetrev 1, Assist. Prof. Dr. Marjan Delipetrev 2 1 Faculty of Computer Science, University Goce Delcev Shtip, Republic of Macedonia

More information

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING

PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING T.Vidhya Sree M.Phil Research Scholar,CS, MGR College, Hosur (India) ABSTRACT Cloud Computing is the long dreamed vision

More information

Privacy Preservation and Secure Data Sharing in Cloud Storage

Privacy Preservation and Secure Data Sharing in Cloud Storage OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh

More information

MEDIA CLOUD: WHEN MEDIA REVOLUTION MEETS RISE OF CLOUD COMPUTING

MEDIA CLOUD: WHEN MEDIA REVOLUTION MEETS RISE OF CLOUD COMPUTING MEDIA CLOUD: WHEN MEDIA REVOLUTION MEETS RISE OF CLOUD COMPUTING Prof. Ajaykumar T. Shah Alpha College of Engineering and Technology, Gandhinagar, Gujarat Abstract: Media content has become the major traffic

More information

Collaborative Knowledge Flow Improving Process-Awareness and Traceability of Work Activities

Collaborative Knowledge Flow Improving Process-Awareness and Traceability of Work Activities Collaborative Knowledge Flow Improving Process-Awareness and Traceability of Work Activities Schahram Dustdar Information Systems Institute, Distributed Systems Group, Vienna University of Technology,

More information

Conceptual Approach for Performance Isolation in Multi-Tenant Systems

Conceptual Approach for Performance Isolation in Multi-Tenant Systems Conceptual Approach for Performance Isolation in Multi-Tenant Systems Manuel Loesch 1 and Rouven Krebs 2 1 FZI Research Center for Information Technology, Karlsruhe, Germany 2 SAP AG, Global Research and

More information

Adaptive Workflow Management in the Cloud Towards a Novel Platform as a Service

Adaptive Workflow Management in the Cloud Towards a Novel Platform as a Service Adaptive Workflow Management in the Cloud Towards a Novel Platform as a Service Mirjam Minor, Ralph Bergmann, Sebastian Görg Business Information Systems II University of Trier 54286 Trier, Germany {minor

More information

Mobile Cloud Middleware: A New Service for Mobile Users

Mobile Cloud Middleware: A New Service for Mobile Users Mobile Cloud Middleware: A New Service for Mobile Users K. Akherfi, H. Harroud Abstract Cloud computing (CC) and mobile cloud computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes

More information

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments

A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments A Comparative Study of Applying Real- Time Encryption in Cloud Computing Environments Faraz Fatemi Moghaddam (f.fatemi@ieee.org) Omidreza Karimi (omid@medicatak.com.my) Dr. Ma en T. Alrashdan (dr.maen@apu.edu.my)

More information

BPM in Cloud Architectures: Business Process Management with SLAs and Events

BPM in Cloud Architectures: Business Process Management with SLAs and Events BPM in Cloud Architectures: Business Process Management with SLAs and Events Vinod Muthusamy and Hans-Arno Jacobsen University of Toronto 1 Introduction Applications are becoming increasingly distributed

More information

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts

More information

Task Placement in a Cloud with Case-based Reasoning

Task Placement in a Cloud with Case-based Reasoning Task Placement in a Cloud with Case-based Reasoning Eric Schulte-Zurhausen and Mirjam Minor Institute of Informatik, Goethe University, Robert-Mayer-Str.10, Frankfurt am Main, Germany {eschulte, minor}@informatik.uni-frankfurt.de

More information

CiteSeer x in the Cloud

CiteSeer x in the Cloud Published in the 2nd USENIX Workshop on Hot Topics in Cloud Computing 2010 CiteSeer x in the Cloud Pradeep B. Teregowda Pennsylvania State University C. Lee Giles Pennsylvania State University Bhuvan Urgaonkar

More information

Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud

Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud Gunho Lee, Byung-Gon Chun, Randy H. Katz University of California, Berkeley, Yahoo! Research Abstract Data analytics are key applications

More information

A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY

A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY Gleison Samuel do Nascimento, Cirano Iochpe Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre,

More information

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud

Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud Sheltered Multi-Owner Data distribution For vibrant Groups in the Cloud I.sriram murthy 1 N.Jagajeevan 2 II M-Tech student Assistant.Professor Department of computer science & Engineering Department of

More information

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing

An Efficient Secure Multi Owner Data Sharing for Dynamic Groups in Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.730

More information

On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers

On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers On the Amplitude of the Elasticity Offered by Public Cloud Computing Providers Rostand Costa a,b, Francisco Brasileiro a a Federal University of Campina Grande Systems and Computing Department, Distributed

More information

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues

A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues A Study on the Cloud Computing Architecture, Service Models, Applications and Challenging Issues Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing

Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Performance Evaluation Panda for Data Storage and Sharing Services in Cloud Computing Gunnala Ajay Kumar M.Tech Student Department of CSE Global Group Of Institutions Batasingaram, Ranga Reddy (Dist),

More information

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer

More information

The Need for Service Catalog Design in Cloud Services Development

The Need for Service Catalog Design in Cloud Services Development The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental

More information

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company

The Impact of Cloud Computing on Saudi Organizations: The Case of a Telecom Company International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184 Volume 3, Number 6(December 2014), pp. 126-130 MEACSE Publications http://www.meacse.org/ijcar The Impact of Cloud Computing

More information

A Cloud Architecture for an Extensible Multi-Paradigm Modeling Environment

A Cloud Architecture for an Extensible Multi-Paradigm Modeling Environment A Cloud Architecture for an Extensible Multi-Paradigm Modeling Environment Jonathan Corley 1 and Eugene Syriani 2 1 University of Alabama, U.S.A. 2 Université de Montréal, Canada Abstract. We present the

More information

Portable Cloud Services Using TOSCA

Portable Cloud Services Using TOSCA Institute of Architecture of Application Systems Portable Cloud Services Using TOSCA Tobias Binz, Gerd Breiter, Frank Leymann, and Thomas Spatzier Institute of Architecture of Application Systems, University

More information

Cloud Computing and Digital Preservation: A Comparison of Two Services. Amanda L. Stowell. San Jose State University

Cloud Computing and Digital Preservation: A Comparison of Two Services. Amanda L. Stowell. San Jose State University Cloud Computing and Digital Preservation: A Comparison of Two Services Amanda L. Stowell San Jose State University Abstract This paper will discuss the obstacles and methods of digital object preservation,

More information

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration

Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Supply Chain Platform as a Service: a Cloud Perspective on Business Collaboration Guopeng Zhao 1, 2 and Zhiqi Shen 1 1 Nanyang Technological University, Singapore 639798 2 HP Labs Singapore, Singapore

More information

Orbiter Series Service Oriented Architecture Applications

Orbiter Series Service Oriented Architecture Applications Workshop on Science Agency Uses of Clouds and Grids Orbiter Series Service Oriented Architecture Applications Orbiter Project Overview Mark L. Green mlgreen@txcorp.com Tech-X Corporation, Buffalo Office

More information

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

An Agent-Based Concept for Problem Management Systems to Enhance Reliability An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub

More information

Optimize workloads to achieve success with cloud and big data

Optimize workloads to achieve success with cloud and big data IBM Software Thought Leadership White Paper December 2012 Optimize workloads to achieve success with cloud and big data Intelligent, integrated, cloud-enabled workload automation can improve agility and

More information

Above the clouds: A Berkeley View of Cloud Computing

Above the clouds: A Berkeley View of Cloud Computing Partial Review-2 On the paper Above the clouds: A Berkeley View of Cloud Computing By Nikhil Ramteke Sr. No.- 07125 6. Cloud Computing Economics Observation in Cloud Economics mainly concerns with following

More information

How To Set Up Wiremock In Anhtml.Com On A Testnet On A Linux Server On A Microsoft Powerbook 2.5 (Powerbook) On A Powerbook 1.5 On A Macbook 2 (Powerbooks)

How To Set Up Wiremock In Anhtml.Com On A Testnet On A Linux Server On A Microsoft Powerbook 2.5 (Powerbook) On A Powerbook 1.5 On A Macbook 2 (Powerbooks) The Journey of Testing with Stubs and Proxies in AWS Lucy Chang lucy_chang@intuit.com Abstract Intuit, a leader in small business and accountants software, is a strong AWS(Amazon Web Services) partner

More information

An Analysis of Data Security Threats and Solutions in Cloud Computing Environment

An Analysis of Data Security Threats and Solutions in Cloud Computing Environment An Analysis of Data Security Threats and Solutions in Cloud Computing Environment Rajbir Singh 1, Vivek Sharma 2 1, 2 Assistant Professor, Rayat Institute of Engineering and Information Technology Ropar,

More information

How To Understand The Individual Competences Of An It Manager

How To Understand The Individual Competences Of An It Manager ORGANIZATIONS ARE GOING TO THE CLOUD: WHICH COMPETENCES FOR THE IT MANAGER? Luca Sabini, Stefano Za, Paolo Spagnoletti LUISS Guido Carli University Rome Italy {lsabini, sza, pspagnoletti}@luiss.it ABSTRACT

More information

SEALED CLOUD. A Reliable Data Center Excluding Provider Access to Client Data WHITE PAPER. Uniscon GmbH - The Web Privacy Company

SEALED CLOUD. A Reliable Data Center Excluding Provider Access to Client Data WHITE PAPER. Uniscon GmbH - The Web Privacy Company SEALED CLOUD A Reliable Data Center Excluding Provider Access to Client Data WHITE PAPER Uniscon GmbH - The Web Privacy Company Agnes-Pockels-Bogen 1 80992 Munich 1 Table of Contents 1. Cloud Computing

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

Processes for the Future: Sustainable External Dependencies of Processes

Processes for the Future: Sustainable External Dependencies of Processes Processes for the Future: Sustainable External Dependencies of Processes Stephan Strodl SBA Research Vienna, Austria sstrodl@sba-research.org ABSTRACT Processes form an integral part of today s business

More information

Digital Watermark Mobile Agents *

Digital Watermark Mobile Agents * Digital Watermark Mobile Agents * Jian Zhao and Chenghui Luo Fraunhofer Center for Research in Computer Graphics, Inc. 321 South Main Street Providence, RI 02903 Abstract Digital watermarking has emerged

More information

Minimal Cost Data Sets Storage in the Cloud

Minimal Cost Data Sets Storage in the Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1091

More information

HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM)

HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) HEALTH INFORMATION MANAGEMENT ON SEMANTIC WEB :(SEMANTIC HIM) Nasim Khozoie Department of Computer Engineering,yasuj branch, Islamic Azad University, yasuj, Iran n_khozooyi2003@yahoo.com ABSTRACT Information

More information

DATABASE DYNAMIC MANAGEMENT PLATFORM (DBDMS) IN OPERATIVE SOFTWARE SYSTEMS

DATABASE DYNAMIC MANAGEMENT PLATFORM (DBDMS) IN OPERATIVE SOFTWARE SYSTEMS DATABASE DYNAMIC MANAGEMENT PLATFORM (DBDMS) IN OPERATIVE SOFTWARE SYSTEMS 1. INTRODUCTION Virgil Chichernea 1 Dragos-Paul Pop 2 In a globalized society with state of the art informational technologies,

More information

THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal

THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE. Johan Versendaal THE IMPACT OF CLOUD COMPUTING ON ENTERPRISE ARCHITECTURE Johan Versendaal HU University of Applied Sciences Utrecht Nijenoord 1, 3552 AS Utrecht, Netherlands, johan.versendaal@hu.nl Utrecht University

More information

Reputation in Cloud Computing

Reputation in Cloud Computing Reputation in Cloud Computing Adrian Yanes Aalto University School of Science and Technology adrian.yanes@aalto.fi Abstract Nowadays the concept of cloud computing is getting popular around the Net. The

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785

[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem

More information

Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture

Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture Dynamic Resource management with VM layer and Resource prediction algorithms in Cloud Architecture 1 Shaik Fayaz, 2 Dr.V.N.Srinivasu, 3 Tata Venkateswarlu #1 M.Tech (CSE) from P.N.C & Vijai Institute of

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

New Cloud Computing Network Architecture Directed At Multimedia

New Cloud Computing Network Architecture Directed At Multimedia 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.16 New Cloud Computing Network

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 International

More information